contact us

Comments

Popular posts from this blog

PlayItSafe google cyber security professional course 2 (COURSERA)

FOUNDATIONS OF CYBERSECURITY GOOGLE(COURSERA) QUIZ ANSWERS

HOW TO BYPASS THE 2FA(TWO FACTOR AUTHENTICATION)

Disclaimer

AUTOMATED SCRIPT FOR FINDING XSS

BITFLIPING

BEGINNER BUG BOUNTY TOOLS PART-1

how hackers do a phishing page in 8 lines of code using html

BEGINNER BUG BOUNTY TOOLS PART 2

The article explores the technique of remote server control through reverse shells employed by hackers, emphasizing their ability to gain unauthorized access and control over servers.